CBSLog_Azure_1_CL | where severity_s == "Informational" | where type_s == "Suspicious Documents" | where status_s != "Closed" or status_s != "Resolved"
relevantTechniques:
- T1119
queryPeriod: 5m
triggerOperator: gt
eventGroupingSettings:
aggregationKind: SingleAlert
suppressionEnabled: false
suppressionDuration: 5h
description: New Suspicious Documents with severity Informational found
version: 1.0.0
tactics:
- Collection
severity: Informational
status: Available
kind: Scheduled
triggerThreshold: 0
queryFrequency: 5m
requiredDataConnectors:
- dataTypes:
- CBSLog_Azure_1_CL
connectorId: CBSPollingIDAzureFunctions
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: false
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/suspicious_documents_informational.yaml
id: 8622df9a-16e7-438b-9975-16604fd401c6
query: CBSLog_Azure_1_CL | where severity_s == "Informational" | where type_s == "Suspicious Documents" | where status_s != "Closed" or status_s != "Resolved"
name: Suspicious Documents (Informational)